Hacking TEEs in server infrastructure
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
832 articles
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
Our experts at GReAT have uncovered a dangerous vulnerability in a smart-home control app that allowed attackers to disable physical security systems.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
Cybercriminals are blackmailing YouTube bloggers into posting malware links in their video descriptions.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
Kaspersky NEXT 2024 in Athens brought together experts to tackle the challenges of AI and deepfakes, highlighting the importance of collaboration, education, and innovative detection technologies.
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
AV-Comparatives has named our new Kaspersky Standard as Product of the Year. This is the highest honor conferred by this renowned independent lab specializing in testing security solutions.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Celebrating the fifth anniversary of its Global Transparency Initiative, Kaspersky NEXT is back! Here’s a deep-dive into the highlights of this exciting cybersecurity conference.
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
Generation X and Millennials putting themselves at risk online despite knowing the dangers
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
Kids and young adults are more tech-savvy than their parents, but does that savviness translate to digital safety?
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Kaspersky VPN Secure Connection is the clear winner in tests of VPN performance, privacy, and transparency carried out by the independent IT-security research institute AV-TEST, and is recognized as the institute’s “Approved Virtual Private Network Solution”.